"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
The Network and Information Security Directive (NIS2) is a new set of cybersecurity regulations adopted by the European Union (EU)...
Read moreAs the reliance on technology and interconnected systems continues to grow, so too do the potential consequences of cyber attacks....
Read moreIn 2019, Carnegie Mellon University's Software Engineering Institute (SEI) joined together with the Cybersecurity and Infrastructure Security Agency (CISA) to...
Read moreEffective cybersecurity best practices involve deploying defensive technologies that leverage AI and ML to anticipate and prevent malicious activities. Some...
Read moreSupply-chain attacks have been exposed to the real world in a number of instances, including when Russian cybercriminals compromised SolarWinds...
Read moreEven if cybersecurity is more and more discussed among organization top executives, CISO still struggle to push their agenda. Common...
Read moreSupply chain-attacks pass through the IT systems of the targeted company's service providers, which makes them difficult to detect. These...
Read moreThe Strengthening American Cybersecurity Act (SACA), signed into law in March of 2022, gives federal authorities an unprecedented look at...
Read moreWhen we think of hacking, we don’t really think of social hacking. This type of hacking based on human weaknesses...
Read moreSecurity Operations Centers (SOC) are evolving from monitoring and responding to threats to identifying risks and collaborating with partners to...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.